Academia.eduAcademia.edu

A Distance Based Clustering Algorithm

2014

Clustering is an unsupervised data mining technique used to determine the objects that are similar in characteristics and group them together. K-means is a widely used partitional clustering algorithm but the performance of K-means strongly depends on the initial guess of centers (centroid) and the final cluster centroids may not be the optimal ones. Therefore it is important for K-means to have good choice of initial centroids. We have developed a clustering algorithm based on distance criteria to select a good set of initial centroids. Once some point d is selected as initial centroid, the proposed algorithm computes average of data points to avoid the points near to d from being selected as next initial centroids. These initial centroids are given as input to the K-means technique leading to a clustering algorithm that result in better clustering as compared to the K-means partition clustering algorithm, agglomerative hierarchical clustering algorithm and Hierarchical partitionin...

International Journal of Computer Engineering andCOMPUTER Technology (IJCET), ISSN 0976-6367(Print), INTERNATIONAL JOURNAL OF ENGINEERING & ISSN 0976 - 6375(Online), Volume 5, Issue 5, May (2014), pp. 120-128 © IAEME TECHNOLOGY (IJCET) IJCET ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 5, Issue 5, May (2014), pp. 120-128 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2014): 8.5328 (Calculated by GISI) www.jifactor.com ©IAEME METHODOLOGY FOR DIFFERENT SOURCE LOCATION PRIVACY PRESERVATION USING IMPROVED STATISTICAL FRAMEWORK IN WIRELESS SENSOR NETWORKS Sonali Pawar Department of Computer Engineering, BSIOTR Wagholi, Pune University, Pune Prof. Mrs. R. A. Mahajan Department of Computer Engineering, BSIOTR Wagholi, Pune University, Pune I. ABSTRACT Many attackers use the nodes location information for security threat in network, as every sensor node in network is having its own location. An attacker tries to get location information of source or receiver. Wireless sensor networks (WSNs) are group of collection of sensor nodes which are collaboratively communicate with each other for information sharing. The sharing of information is done between source sensor node and sink sensor node using the routing protocols. The major constraint of this network is the security. Thus we need to have source location privacy methods in WSN to prevent such threats from the network. Source privacy preservation is also called source anonymity and recent time this attracts many researchers interests. The attacker or unauthorized sensor node not able to get events location information through the current network traffic is called as source anonymity problem. Recently we have studied efficient method for source anonymity in WSNs. In most of real life applications of WSNs, sensor networks are having the location information about various events and this information needs to secure or anonymous. In that method the statistical framework is presented, this is based on the binary hypothesis testing for modeling, analyzing, and evaluating statistical source anonymity WNS. The concept of notion of interval in distinguish ability in order to model source anonymity, however this method fails to satisfy the notion of interval in distinguish ability practically. Therefore, in this paper we are further extending this method address such issues and practically prove its efficiency, we proposed a modification to existing solutions to improve their anonymity against correlation tests Index Terms: Attackers, Source Location, Sensor Network, Energy Consumption. 120 Privacy Preservation, Source Anonymity, International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 5, May (2014), pp. 120-128 © IAEME II. INTRODUCTION Recently we have studied in Toward a Statistical Framework for Source Anonymity in Sensor Networks. In most of applications the locations of events reported by a sensor network need to remain anonymous. That is, unauthorized observers must be unable to detect the origin of such events by analyzing the network traffic, Security of wireless sensor networks, with variety of techniques based on different adversarial assumptions it introduces the notion of “interval in distinguish ability” and provides a quantitative measure to model anonymity in wireless sensor networks; second, it maps source anonymity to the statistical problem of binary hypothesis testing with nuisance parameters. In which how mapping source anonymity to binary hypothesis testing with nuisance parameters leads to converting the problem of exposing private source information into searching for an appropriate data transformation that removes or minimize the effect of the nuisance information. Transform the problem from analyzing real-valued sample points to binary codes, which opens the door for coding theory to be incorporated into the study of anonymous sensor networks. In Proposed system propose a quantitative measure to evaluate statistical source anonymity in sensor networks. Sensor networks are deployed to sense, monitor, and report events of interest in a wide range of applications including, but are not limited to, military, health care and animal tracking [1], [2], [3]. In many applications, such monitoring networks consist of energy constrained nodes that are expected to operate over an extended period of time, making energy efficient monitoring an important feature for unattended networks. In such scenarios, nodes are designed to transmit information only when a relevant event is detected (i.e., event-triggered transmission). Consequently, given the location of an event-triggered node, the location of a real event reported by the node can be approximated within the node’s sensing range. The locations of the combat vehicle at different time intervals can be revealed to an adversary observing nodes transmissions. There are three parameters that can be associated with an event detected and reported by a sensor node: the description of the event, the time of the event, and the location of the event. When sensor networks are deployed in untrustworthy environments, protecting the privacy of the three parameters that can be attributed to an event triggered transmission becomes an important security feature in the design of wireless sensor networks. While transmitting the “description” of a sensed event in a private manner can be achieved via encryption primitives, hiding the timing and spatial information of reported events cannot be achieved via cryptographic means. The source anonymity problem in wireless sensor networks is the problem of studying techniques that provide time and location privacy for events reported by sensor nodes. In the existing literature, the source anonymity problem has been addressed under two different types of adversaries, namely, local and global adversaries. A local adversary is defined to be an adversary having limited mobility and partial view of the network traffic. Efficient power saving scheme and corresponding algorithm must be developed and designed in order to provide reasonable energy consumption and to improve the network lifetime for wireless sensor network systems. The cluster-based technique is one of the approaches to reduce energy consumption in wireless sensor networks. In this article, we propose a optimize energy clustering algorithm to provide efficient energy consumption in such networks. The main idea of this article is to reduce data transmission distance of sensor nodes in wireless sensor networks by using the uniform cluster concepts. In order to make an ideal distribution for sensor node clusters, we calculate the average distance between the sensor nodes and take into account the residual energy for selecting the appropriate cluster head nodes. The lifetime of wireless sensor networks is extended by using the uniform cluster location and balancing the network loading among the clusters. Simulation results indicate the superior performance of our proposed algorithm to strike the appropriate performance in the energy consumption and network lifetime for the wireless sensor networks. 121 International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 5, May (2014), pp. 120-128 © IAEME WSN is nothing but the group of number of small sensor wireless devices which are constrained for limited resource. These devices are also called as motes. In addition to this, WSN consisting of one or few general purpose computing devices referred to as base stations (or sinks). The basic use of WSN is to perform the monitoring of physical phenomenon for example light monitoring, temperature monitoring, barometric monitoring etc over the geographical area of WSN deployment. Each sensor node in WSN is having the functionalities such as battery, processing unit and sensors. Each sensor node is having limitations of battery power which is means WSN is resource constrained. On the other hand, the base stations in WSN are nothing but laptops capabilities therefore those are not power constrained. The role of base station is bridge the communication gap between the other networks and WSN. The real time applications of WSNs are military applications, health applications, commercial applications, temperature monitoring etc [1]. The classification of WSNs is based on different aspects with main focus of designing the secure routing protocol. The mobility of sensor nodes as well as base station is one aspect based on which the WSNs are classified. In WSNs, the sensor nodes are either stationary or mobile based on application requirements. Another reason of WSNs classification is topology used for nodes position. The placements of nodes are either done manually or randomly by using existing methods of topology. The total number of mobile nodes in WSN is also key based on which the WSNs are classified [13]. Now days, privacy is main challenge of WSNs. This privacy is divided into two classes such as contextual privacy and content oriented privacy. The contextual privacy is basically concerning with the concerns the ability of adversaries to infer information from observations of sensors and communications without access to the content of messages. Content-oriented privacy is concerned with the ability of adversaries to learn the content of transmissions in the sensor network. In contrast to content-oriented security, the issue of contextual privacy is concerned with protecting the context associated with the dimensions and transmission of sensed data. For many scenarios, general contextual information surrounding the sensor application, specially the location of the message originator and the base station called as sink. Among the different security threats in wireless sensor networks one is eavesdropping which involves attack against the confidentiality of data that is being transmitted across the network. Various privacy-preserving routing techniques have been developed for sensor networks. Most of them are designed to protect against the local eavesdropper and some of them are capable of protecting against global eavesdropper [3] [7]. In the following section III we will discuss the different types of recommendation approaches along with their advantages and disadvantages. Section IV presents the proposed approach. III. LITERATURE REVIEW In this section we are presenting the different methods those are presented to over the problem of source location privacy in WSNs. • • • In [4], Xi et al. proposed a new random walk routing method that reduces energy consumption at the cost of increased delivery time. Path confusion has also been proposed as an anonymitypreserving routing scheme by Hoh and Gruteser in [5]. In [8], Ouyang et al. developed a scheme in which cycles are introduced at various points in the route, potentially trapping the adversary in a loop and forcing the adversary to waste extra resources. In [6], Wang et al. proposed a technique to maximize source location privacy by designing routing protocols that distribute message flows to different routes. However, in the global adversarial model, in which the adversary has access to all transmissions in the network, routing-based schemes are insufficient to provide location privacy. 122 International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 5, May (2014), pp. 120-128 © IAEME • • • • • • • • In [7], the global adversarial model was first introduced by Mehta et al. The authors motivated the problem, analyzed the security of existing routing-based schemes under the new model, and proposed two new schemes. In the first scheme, some sensor nodes act as fake sources by mimicking the behavior of real events. For example, if the network is deployed to track an animal, the fake sources could send fake messages with a distribution resembling that of the animal’s movements. This, however, assumes some knowledge of the time distribution of real events. In the second scheme, packets (real and fake) are sent either at constant intervals or according to a predetermined probabilistic schedule. Although this scheme provides perfect location privacy, it also introduces undesirable performance characteristics, in the form of either relatively high delay or relatively high communication and computational overhead. In [9], Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, presented the survey over wireless sensor networks which includes the flexibility, fault tolerance, high sensing fidelity, low-cost and rapid deployment characteristics of sensor networks create many new and exciting application areas for remote sensing. However, realization of sensor networks needs to satisfy the constraints introduced by factors such as fault tolerance, scalability, cost, hardware, topology change, environment and power consumption. Since these constraints are highly stringent and specific for sensor networks, new wireless ad hoc networking techniques are required. In [10], T. Arampatzis, J. Lygeros, and S. Manesis, Wireless sensors and wireless sensor networks have come to the forefront of the scientific community recently. This is the consequence of engineering increasingly smaller sized devices, which enable many applications. The use of these sensors and the possibility of organizing them into networks have revealed many research issues and have highlighted new ways to cope with certain problems. In this paper, different applications areas where the use of such sensor networks has been proposed are surveyed. In [11], Shao et al. introduced the notion of statistically strong source anonymity in which a global adversary with ability to monitor the traffic in the entire network is unable to infer source locations by performing statistical analysis on the observed traffic. In order to realize their notion of statistical anonymity, nodes are programmed to transmit fake events according to pre-specified distribution. The goal in [11], however, is to minimize the latency of reporting real events while maintaining statistical in distinguish ability between real and fake transmissions. In [12], [13], techniques are proposed to reduce the amount of traffic in the network that is due to the transmission of fake events, techniques based on node proxies and data aggregation. In such techniques, the overall communication overhead is reduced by making intermediate nodes act as proxies that filter out fake messages or by aggregating multiple messages in a single transmission. Such approaches make schemes based on generating fake messages more attractive by mitigating the high communication overhead issue. In [14], Shao et al. also consider the problem of an active adversary. Their adversary also has the ability to perform node compromise attacks, and they develop tools to prevent the adversary from gaining access to event data stored in a node even if the adversary possesses that node’s secret keys. In [15], Li and Ren proposed a scheme to provide both content confidentiality and sourcelocation privacy through routing to a randomly selected intermediate node (RRIN) and a network mixing ring (NMR), where the RRIN provides local source location privacy and NMR yields network-level (global) source location privacy. In [16], Ouyang et al. proposed four schemes: naive, global, greedy, and probabilistic to protect the source location against global adversaries in. 123 International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 5, May (2014), pp. 120-128 © IAEME • In [17], Abbasi et al. proposed a distributed algorithm to mix real event traffic with carefully chosen dummy traffic to hide the real event traffic pattern. IV. METHODOLOGY AND PROPOSED ALGORITHM • • • • Introduce the notion of “interval in distinguish ability” and illustrate how the problem of statistical source anonymity can be mapped to the problem of interval in distinguish ability. Propose a quantitative measure to evaluate statistical source anonymity in sensor networks. Map the problem of breaching source anonymity to the statistical problem of binary hypothesis testing with nuisance parameters. Demonstrate the significance of mapping the problem in hand to a well-studied problem in uncovering hidden vulnerabilities. In particular, realizing that the SSA problem can be mapped to the hypothesis testing with nuisance parameters implies that breaching source anonymity can be converted to finding an appropriate data transformation that removes the nuisance information. MODELING ANONYMITY In this section we introduce our anonymity model for Wireless sensor networks. Intuitively, anonymity should be measured by the amount of information about sources’ locations an adversary can infer by monitoring the sensor network. The challenge, however, is to come up with an appropriate model that captures all possible sources of information leakage and a proper way of quantifying anonymity in different systems. We start here by stating our assumptions about the network structure and the adversary’s capabilities. We will then describe the currently used notion for source anonymity in sensor networks and point out a source of information leakage that is undetectable by this notion. Then, we will give a formal defination of a stronger Anonymity notion that, in addition to capturing the sources of information leakage captured by the current notion, captures the source of information leakage that was missed by the current notion, finally, we propose a quantitative measure for evaluating the security of anonymous sensor networks. NETWORK MODEL We assume that communications take place in a network of energy constrained sensor nodes. That is, nodes are assumed to be powered with unchangeable batteries, thus, conserving nodes energy is a design requirement. Nodes are also equipped with a semantically secure encryption algorithm, so that computationally bounded adversaries are unable to distinguish between real and fake transmission by means of cryptographic tests. When a node detects an event, it places information about the event in a message and broadcasts an encrypted version of the message. ADVERSARIAL MODEL Our adversary is similar to the one considered in [6], [7], in that it is external, passive, and global. By external, we mean that the adversary does not control any of the nodes in the network and also has no control over the real event process. By passive, we mean that the adversary is capable of eavesdropping on the network, active attacks are not considered. By global, we mean that the adversary can simultaneously monitor the activity of all nodes in the network. In particular, the adversary can observe the timing and origin of every transmitted message. As opposed to a global adversary, a local adversary is only capable of eavesdropping over a small area, typically the area surrounding the base station, and attempts to determine the source of traffic by examining the packet routing information or trying to follow the packets back to their source. Protocols that attempt to 124 International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 5, May (2014), pp. 120-128 © IAEME disguise the source of traffic through routing, while highly secure against local adversaries, do not defend against global adversaries [6]. We also assume that the adversary is capable of storing large amount of message traffic data and performing complex statistical tests. Furthermore, the adversary is assumed to know the distribution of fake message transmissions. The only information unknown to the adversary is the timing when real events occur. Messages for the duration of that time interval. Assume now that a moving platoon is in the vicinity of this node and the node started to report location information about the moving platoon. The enemy does not need to distinguish between individual transmissions to infer the existence of the moving platoon. All that is needed is the ability to distinguish between the time interval when no real activity is reported and the time interval when the platoon is in the vicinity of the sensor node. Consequently, in many real life applications, modeling Source anonymity in sensor networks by the adversary’s ability to distinguish between individual event transmissions is insufficient to guarantee location privacy. This fact calls for a stronger model to properly address source anonymity in sensor networks. Before we proceed to the new anonymity model, we formally define the currently adopted notion to model Anonymity in sensor networks, namely, event in distinguish ability. Definition 1 (Event In distinguish ability - ‘EI’): Events Reported by sensor nodes are said to be in distinguishable if the inter-transmission times between them cannot be distinguished with significant confidence by means of statistical tests. Interval In distinguish ability (II) The main goal of source location privacy systems is to hide the existence of real events. This implies that, an adversary observing a sensor node during different time intervals, at which some of the intervals include the transmission of real events and the others do not, should not be able to determine with significant confidence which of the intervals contain real traffic. This leads to the notion of interval in distinguish ability that will be essential for our anonymity formalization. Definition 2 (Interval In distinguish ability - ‘II’): Let IF denotes a time interval with only fake event Transmissions (call it the “fake interval”), and IR denotes time interval with some real event transmissions (call it the “real interval”). The two time intervals are said to be statistically indistinguishable if the distributions of inter-transmission times during these two intervals cannot be distinguished by means of statistical tests. To model interval in distinguish ability. Analysis of EI-based Approaches In this section we analyze, using our proposed model, Systems that were shown to be secure under event in distinguish ability; i.e., EI-based systems, We provide theoretical analysis showing that real and fake intervals can be statistically distinguishable. Then, we simulate an existing scheme to show that the simulation results coincide with the analytical results, and to quantify the anonymity ofthe simulated design. We start by a recapitulation of EI based approaches for providing source anonymity in sensor networks. EI-based Approaches Recall that nodes are designed to transmit fake messages according to a pre-specified distribution. Furthermore, nodes store a sliding window of times between consecutive transmissions, say X1; X2; _ _ _ ; Xk, where Xiis the random variable representing the time between the ith and the i+1st transmissions and k is the length of the sliding window. When a real event occurs, its transmission time, represented by Xk+1, is defined to be the smallest value such that the sequence 125 International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 5, May (2014), pp. 120-128 © IAEME X2;X3; _ _ _ ;Xk+1 passes some statistical goodness of fit tests. That is, an adversary observing the sequence of inter-transmission times will observe a sequence that is statistically in distinguishable from an iid sequence of random variables with the pre-specified Distribution of fake message transmissions, However, by continuing in this fashion, the mean will Skew since nodes always favor shorter intervals to transmit real events. To adjust the mean, the next transmission following a real one, Xk+2 in this example, will be delayed. Again, the delay is determined so that the sequence in the sliding window satisfies some statistical goodness of fittest. Consequently, as shown in [7], an adversary observing the sensor node cannot differentiate between real and fake transmissions. Theoretical Interval Distinguish ability As discussed in Section 3, when an adversary can distinguish between real and fake intervals, source location can be exposed, even if the adversary cannot distinguish between individual transmissions. In what follows, we give theoretical analysis of interval in distinguish ability in EI based systems. Let Xi be the random variable representing the time between the ith and the i + 1st transmissions and let E[Xi] .We will demonstrate an adversary’s strategy of detecting the source location by investigating two intervals, a fake interval and a real one. Binary Hypothesis testing with nuisance parameters: In binary hypothesis testing, given two hypothesis, H0 and H1, and a data sample that belongs to one of the two hypotheses (e.g., a bit transmitted through a noisy communication channel), the goal is to decide to which hypothesis the data sample belongs. In the statistical strong anonymity problem under interval in distinguish ability, given an interval of inter transmission times; the goal is to decide whether the interval is fake or real. Quantitative Measure: Our aim to find a security measure that can formally quantify the anonymity of different systems. Let’s denote any adversarial strategy for breaching the anonymity of the system. Fake Interval (IF): Recall that, in the absence of real events, nodes are programmed to transmit iid fake messages according to a pre-specified probability distribution Real Interval (IR): By definition, real intervals will have both fake and real transmissions. Let Ei be the random variable. Representing the type of the event reported in the it transmission, i.e., fake or real. V. EXPERIMENTAL ANALYSIS There are three parameters that can be associated with an event detected and reported by a sensor node: the description of the event, the time of the event, and the location of the event. When sensor networks are deployed in untrustworthy environments, protecting the privacy of the three parameters that can be attributed to an event triggered transmission becomes an important security feature in the design of wireless sensor networks. Transmitting the “description” of a Sensed event in a private manner can be achieved via Encryption primitives, hiding the timing and spatial Information of reported events. Statistical goodness of fit based approach (without nuisance) Statistical goodness of fit based approach (with nuisance) Our Modified Approach ( without nuisance) Proposed Approach PR > PF PR < PF PR = PF 7,301 2,695 4 Anonymity Bound 0.539 5,076 4,924 0 0.984 5,161 4,832 7 0.967 5,234 4,912 6 0.946 126 International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 5, May (2014), pp. 120-128 © IAEME X axis = No. of nodes Y axis = Anonymity bound in sec Figure: Result Graph VI. CONCLUSION AND FUTURE WORK In this paper, provided a statistical framework based on binary hypothesis testing for modeling, analyzing, and evaluating statistical source anonymity in wireless sensor networks. Also introduced the notion of interval in distinguish ability to model source location privacy, Show that the current approaches for designing statistically anonymous systems introduce correlation in real intervals while fake intervals are uncorrelated. By mapping the problem of detecting source information to the statistical problem of binary hypothesis testing with nuisance parameters, also showed why previous studies were unable to detect the source of information leakage that was demonstrated in this paper. Finally, in proposed a modification to existing solutions to improve their anonymity against correlation tests. VII. REFERENCE [1] [2] [3] [4] Basel Alomair, Member, IEEE, Andrew Clark, Student Member, IEEE, Jorge Cuellar, and Radha Poovendran, Senior Member, IEEE, “Toward a Statistical Framework for Source Anonymity in Sensor Networks”, IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 12, NO. 2, FEBRUARY 2013. B. Alomair, A. Clark, J. Cuellar, and R. Poovendran, “Statistical Framework for Source Anonymity in Sensor Networks,” Proc. IEEE GlobeCom, 2010. B. Alomair, A. Clark, J. Cuellar, and R. Poovendran, “On Source Anonymity in Wireless Sensor Networks,” Proc. IEEE/IFIP 40th Int’l Conf. Dependable Systems and Networks (DSN ’10), 2010. Y. Xi, L. Schwiebert, and W. Shi, “Preserving Source Location Privacy in Monitoring-Based Wireless Sensor Networks,” Proc. IEEE 20th Int’l Parallel & Distributed Processing Symp. (IPDPS ’06), pp. 1-8, 2006. 127 International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 5, May (2014), pp. 120-128 © IAEME [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] B. Hoh and M. Gruteser, “Protecting Location Privacy Through Path Confusion,” Proc. IEEE/CreatNet First Int’l Conf. Security and Privacy for Emerging Areas in Comm. Networks (SecureComm ’05), pp. 194-205, 2005. H. Wang, B. Sheng, and Q. Li, “Privacy-Aware Routing in Sensor Networks,” Elsevier J. Computer Networks, vol. 53, no. 9, pp. 1512-1529, 2009. K. Mehta, D. Liu, and M. Wright, “Location Privacy in Sensor Networks against a Global Eavesdropper,” Proc. IEEE 15th Int’l Conf. Network Protocols (ICNP ’07), pp. 314-323, 2007. Y. Ouyang, Z. Le, G. Chen, J. Ford, F. Makedon, and U. Lowell, “Entrapping Adversaries for Source Protection in Sensor Networks,” Proc. IEEE Seventh Int’l Symp. World of Wireless, Mobile and Multimedia Networks (WOWMOM ’06), pp. 32-41, 2006. I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless Sensor Networks: A Survey,” Computer Networks, vol. 38, no. 4, pp. 393-422, 2002. Arampatzis, J. Lygeros, and S. Manesis, “A Survey of Applications of Wireless Sensors and Wireless Sensor Networks,” Proc. IEEE 13th Mediterranean Conf. Control and Automation (MED ’05), pp. 719-724, 2006. M. Shao, Y. Yang, S. Zhu, and G. Cao, “Towards Statistically Strong Source Anonymity for Sensor Networks,” Proc. IEEE INFOCOM, pp. 466-474, 2008. Y. Yang, M. Shao, S. Zhu, B. Urgaonkar, and G. Cao, “Towards Event Source Unobservability with Minimum Network Traffic in Sensor Networks,” Proc. First ACM Conf. Wireless Network Security (WiSec ’08), pp. 77-88, 2008. W. Yang and W. Zhu, “Protecting Source Location Privacy in Wireless Sensor Networks with Data Aggregation,” Proc. Seventh Int’l Conf. Ubiquitous Intelligence and Computing (UIC ’10), pp. 252-266, 2010. M. Shao, S. Zhu, W. Zhang, G. Cao, and Y. Yang, “pDCS: Security and Privacy Support for Data-Centric Sensor Networks,” IEEE Trans. Mobile Computing, vol. 8, no. 8, pp. 1023-1038, Aug. 2009. Y. Li and J. Ren, “Preserving Source-Location Privacy in Wireless Sensor Networks,” Proc. IEEE Sixth Ann. Comm. Soc. Conf. Sensor, Mesh and Ad Hoc Comm. and Networks (SECON ’09), pp. 493-501, 2009. Y. Ouyang, Z. Le, D. Liu, J. Ford, and F. Makedon, “Source Location Privacy against Laptop-Class Attacks in Sensor Networks,” Proc. Fourth Int’l Conf. Security and Privacy in Comm. Networks (SecureComm ’08), pp. 1-10, 2008. A. Abbasi, A. Khonsari, and M. Talebi, “Source Location Anonymity for Sensor Networks,” Proc. IEEE Sixth Conf. Consumer Comm. and Networking Conf. (CCNC ’09), pp. 588-592, 2009. Preetee K. Karmore, Supriya S. Thombre and Gaurishankar L. Girhe, “Review on Operating Systems and Routing Protocols for Wireless Sensor Networks”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 3, 2013, pp. 331 - 339, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. K.Sangeetha and Dr. K.Ravikumar, “A Framework For Practical Vulnerabilities of the Tor (The Onion Routing) Anonymity Network”, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 3, 2012, pp. 112 - 120, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. Revathi Venkataraman, K.Sornalakshmi, M.Pushpalatha and T.Rama Rao, “Implementation of Authentication And Confidentiality In Wireless Sensor Network”, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 2, 2012, pp. 553 - 560, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. 128